CallerName | Describe |
__radix_tree_preload | Load up this CPU's radix_tree_node buffer with sufficient objects to* ensure that the addition of a single element in the tree cannot fail |
radix_tree_cpu_dead | |
xas_destroy | xas_destroy() - Free any resources allocated during the XArray operation.*@xas: XArray operation state.* This function is now internal-only. |
kmem_cache_oob | |
memcg_accounted_kmem_cache | |
kmem_cache_double_free | |
kmem_cache_invalid_free | |
do_kmem_cache_size | Test kmem_cache with given parameters: |
do_kmem_cache_rcu_persistent | Check that the data written to an RCU-allocated object survives* reallocation. |
btree_free | |
free_obj_work | |
debug_objects_replace_static_objects | Convert the statically allocated objects to dynamic ones: |
lc_create | lc_create - prepares to track objects in an active set*@name: descriptive name only used in lc_seq_printf_stats and lc_seq_dump_details*@max_pending_changes: maximum changes to accumulate until a transaction is required*@e_count: number of elements |
lc_free_by_index | |
vm_area_free | |
free_signal_struct | |
__cleanup_sighand | |
free_user | IRQs are disabled and uidhash_lock is held upon function entry.* IRQ state (as stored in flags) is restored and uidhash_lock released* upon function exit. |
alloc_uid | |
__sigqueue_free | |
rcu_free_pwq | |
put_pid | |
alloc_pid | |
create_new_namespaces | Create new nsproxy and all of its the associated namespaces.* Return the newly created nsproxy. Do not attach this to the task,* leave it to the caller to do proper locking and attach it to task. |
free_nsproxy | |
put_cred_rcu | The RCU callback to actually dispose of a set of credentials |
alloc_posix_timer | |
k_itimer_rcu_free | |
clone_uts_ns | Clone a new ns copying an original utsname, setting refcount to 1*@old_ns: namespace to clone* Return ERR_PTR(-ENOMEM) on error (failure to allocate), new ns otherwise |
free_uts_ns | |
create_user_ns | Create a new user namespace, deriving the creator from the user in the* passed credentials, and replacing that user with the new root user for the* new namespace.* This is called by copy_creds(), which will finish setting the target task's* credentials. |
free_user_ns | |
create_pid_namespace | |
delayed_free_pidns | |
audit_buffer_free | |
audit_tree_destroy_watch | |
taskstats_tgid_alloc | |
trace_destroy_fields | |
remove_event_file_dir | |
__kmem_cache_free_bulk | |
create_cache | |
slab_kmem_cache_release | |
__put_nommu_region | lease a reference to a region* - the caller must hold the region semaphore for writing, which this releases* - the region may not have been added to the tree yet, in which case vm_top* will equal vm_start |
do_mmap | handle mapping creation for uClinux |
split_vma | split a vma into two pieces at address 'addr', a new vma is allocated either* for the first part or the tail. |
ptlock_free | |
anon_vma_free | |
anon_vma_chain_free | |
merge_or_add_vmap_area | Merge de-allocated chunk of VA memory with previous* and next free blocks. If coalesce is not done a new* free area is inserted. If VA has been merged, it is* freed. |
adjust_va_to_fit_type | |
alloc_vmap_area | Allocate a region of KVA of the specified size and alignment, within the* vstart and vend. |
zswap_entry_cache_free | |
__mpol_put | Slow path of a mpol destructor. |
sp_free | |
sp_alloc | |
shared_policy_replace | Replace a policy range. |
free_rmap_item | |
free_stable_node | |
free_mm_slot | |
slab_destroy | slab_destroy - destroy and release all objects in a slab*@cachep: cache pointer being destroyed*@page: page pointer being destroyed* Destroy all the objs in a slab page, and release the mem back to the system. |
free_kmem_cache_nodes | |
slab_mem_offline_callback | |
free_mm_slot | |
mem_pool_free | Return the object to either the slab allocator or the memory pool. |
free_object_rcu | RCU callback to free a kmemleak_object. |
create_object | Create the metadata (struct kmemleak_object) corresponding to an allocated* memory block and add it to the object_list and object_tree_root. |
add_scan_area | Add a scanning area to the object. If at least one such area is added,* kmemleak will only scan these ranges rather than the whole memory block. |
cache_free_handle | |
cache_free_zspage | |
free_handle | |
__release_z3fold_page | |
blk_alloc_queue_node | lk_alloc_queue_node - allocate a request queue*@gfp_mask: memory allocation flags*@node_id: NUMA node to allocate memory from |
blk_free_queue_rcu | |
icq_free_icq_rcu | |
ioc_release_fn | Slow path for ioc release in put_io_context(). Performs double-lock* dancing to unlink all icq's and then frees ioc. |
put_io_context | put_io_context - put a reference of io_context*@ioc: io_context to put* Decrement reference count of @ioc and release it if the count reaches* zero. |
create_task_io_context | |
ioc_create_icq | _create_icq - create and link io_cq*@ioc: io_context of interest*@q: request_queue of interest*@gfp_mask: allocation mask* Make sure io_cq linking @ioc and @q exists |
bfq_put_queue | Task holds one reference to the queue, dropped when task exits. Each rq* in-flight on this queue also holds a reference, dropped when rq is freed.* Scheduler lock must be held here. Recall not to use bfqq after calling* this function on it. |
key_alloc | key_alloc - Allocate a key of the specified type.*@type: The type of key to allocate.*@desc: The key description to allow the key to be searched out.*@uid: The owner of the new key.*@gid: The group ID for the new key's group permissions. |
inode_free_by_rcu | |
security_file_free | |
avc_xperms_decision_free | |
avc_xperms_free | |
avc_node_free | |
avc_node_kill | |
smack_cred_free | smack_cred_free - "free" task-level security credentials*@cred: the credentials in question |
iint_free | |
fasync_free_rcu | |
fasync_free | NOTE! This can be used only for unused fasync entries:* entries that actually got inserted on the fasync list* need to be released by rcu - see fasync_remove_entry. |
__d_free | |
__d_free_external | |
__d_alloc | __d_alloc - allocate a dcache entry*@sb: filesystem it will belong to*@name: qstr of the name* Allocates a dentry. It returns %NULL if there is insufficient memory* available. On a success the dentry is returned. The name passed in is |
free_inode_nonrcu | |
dup_fd | Allocate a new files structure and copy contents from the* passed in files structure.* errorp will be valid only when the returned files_struct is NULL. |
put_files_struct | |
alloc_vfsmnt | |
free_vfsmnt | |
seq_release | seq_release - free the structures associated with sequential file.*@file: file in question*@inode: its inode* Frees the structures associated with sequential file; can be used* as ->f_op->release() if you don't have private data to destroy. |
free_fs_struct | |
free_buffer_head | |
bdev_free_inode | |
dio_complete | dio_complete() - called when all DIO BIO I/O has been completed* This drops i_dio_count, lets interested parties know that a DIO operation* has completed, and calculates the resulting return code for the operation |
do_blockdev_direct_IO | This is a library function for use by filesystem drivers |
fsnotify_connector_destroy_workfn | |
fsnotify_attach_connector_to_object | |
dnotify_handle_event | Mains fsnotify call where events are delivered to dnotify.* Find the dnotify mark on the relevant inode, run the list of dnotify structs* on that mark and determine which of them has expressed interest in receiving* events of this type |
dnotify_free_mark | |
dnotify_flush | Called every time a file is closed. Looks first for a dnotify mark on the* inode. If one is found run all of the ->dn structures attached to that* mark for one relevant to this process closing the file and remove that* dnotify_struct |
fcntl_dirnotify | When a process calls fcntl to attach a dnotify watch to a directory it ends* up here. Allocate both a mark for fsnotify to add and a dnotify_struct to be* attached to the fsnotify_mark. |
inotify_free_mark | ding dong the mark is dead |
fanotify_free_event | |
fanotify_free_mark | |
ep_unregister_pollwait | This function unregisters poll callbacks from the associated file* descriptor. Must be called with "mtx" held (or "epmutex" if called from* ep_free). |
epi_rcu_free | |
ep_insert | Must be called with "mtx" held. |
userfaultfd_ctx_put | serfaultfd_ctx_put - Releases a reference to the internal userfaultfd* context.*@ctx: [in] Pointer to userfaultfd context.* The userfaultfd context reference must have been previously acquired either* with userfaultfd_ctx_get() or userfaultfd_ctx_fdget(). |
SYSCALL_DEFINE1 | |
free_ioctx | _ioctx() should be RCU delayed to synchronize against the RCU* protected lookup_ioctx() and also needs process context to call* aio_free_ring(). Use rcu_work. |
ioctx_alloc | x_alloc* Allocates and initializes an ioctx. Returns an ERR_PTR if it failed. |
aio_get_req | aio_get_req* Allocate a slot for an aio request.* Returns NULL if no requests are free.* The refcount is initialized to 2 - one for the async op completion,* one for the synchronous code that does this. |
iocb_destroy | |
io_ring_ctx_alloc | |
__io_free_req | |
io_ring_ctx_free | |
put_crypt_info | |
fsverity_free_info | |
locks_get_lock_context | |
locks_free_lock_context | |
locks_free_lock | Free a lock which is not in use. |
mb_cache_entry_create | mb_cache_entry_create - create entry in cache*@cache - cache where the entry should be created*@mask - gfp mask with which the entry should be allocated*@key - key of the entry*@value - value of the entry*@reusable - is the entry reusable by others? |
__mb_cache_entry_free | |
dquot_destroy | |
free_dcookie | |
reqsk_alloc | |
__reqsk_free | |
mempool_free_slab | |